The
access control system can be referred to a complete security feature of the windows
that provide access to the resources in the operating system. several types of
applications can call the function of an access control system for the specific
resources and the control access for the resources (Networkworld. com, 2017). The access control
system is the gravity of a computer security system, that controls the resources,
programs, and executes the shared data analysis on the principles. In the
present work, an overview of the security model describes the controlling
access for the objects and applications in windows such as through files of
Microsoft word (Securereading. com, 2018). The access controlling
system requires the setting of the system for the administrative functions and high-level
description is considered for the access control system and how the interaction
of attackers with the system can be controlled by the several processes. The present
work proposes alternative solutions to preserve the system and information
security process from the malware attacks. The prevention and modification for
the internal and external consistency are considered to reduce the unwanted
attacks (Networkworld. com, 2017).
Assumptions of Tampering the Microsoft word
Microsoft
word can be used to launch multistage attacks in a system and to access the
confidential data. The data breaching contains the exploiting process for
macros, embedded scripts and automatic interaction of the user with the malware
files. There are mainly four requirements of data security including
authenticity, availability, integrity, and confidentiality for the insurance of
data security (Blog. malwarebytes. com, 2017; Securereading. com,
2018).
The attacker can view the contents of a specific Microsoft word document file that
is not open to access for an anonymous user. The analysis is subjected to some
conditions that are mentioned below,
1.
There are no exploitable vulnerabilities
existing in the system.
2.
The attacker uses a non-privileged account on
the system (Blog. malwarebytes. com, 2017).
3.
The basic system of the access control process does
not provide permission to access the files and the attacker requires other
information and cannot access the control system directly.
4.
The attacker is not able to physically tamper
the system in any way (Securereading. com, 2018).
Core security mechanism of windows
The
members of cybercrime are putting efforts to reduce the malware attacks and
threats of crimes. But at the same time, the attackers are getting more
advanced to find the new methods to gain control in any system for the data
breaching. The attackers dragged the company to suffer from lots of risks and
to recollect the data from the backup system. In the present work, different
scenarios are considered to evaluate the processes regarding the harm of
Microsoft word files by the attackers (Blog. malwarebytes. com, 2017). The analysis
includes consideration for the security architecture of the Microsoft
organization and services to prevent the malware attacks. The issues regarding
the attacks and handling of the security process in the organization can be
accessed easily for the malware attacks. The attackers can use an unauthorized
account on the system, the mechanism used by the controlling system of the
organization is different for unauthorized users. The approaches are different
for the activities of the organization related to the services and the issues
of security (Securereading. com, 2018; Blog. malwarebytes. com,
2017).
Functions of the access control mechanism
The
security process is essential for the proper functioning of the operating
system. the access control mechanism provides security in the operating system
and prevents attacks. The security process allows the users to do several functions
but at the same time restricts unauthorized use of the system (Blog. malwarebytes. com, 2017). All the windows
operating systems are developed in such a way that it uses windows 9x system to
have use of access control. There are two different approaches for the monitoring
of access in the operating system of windows and these approaches include
common level access monitoring and user level access monitoring (Networkworld. com, 2017). The common level
access monitoring system is an easy process for the allocation of the
resources. In this process, all the data is shared by providing resources of
full access and read-only access. In case of user level access monitoring
system, the network resources are used for the authentication of the user
request for the proper access to the system (Blog. malwarebytes. com, 2017). The only security
process in granting access towards the authorized system is related to the
validation of password and username in the previously recorded user account
database. The user level access monitoring system is related to Internet
Security providing a process (Networkworld. com, 2017).
The low-level safety mechanism
The
low-level safety mechanism includes visualization-based security, safe booting,
Windows hollow, passport, authorization guard, system guard, and enterprise
data security process. The visualization base Security System results in the
primary standard for operating system security. The virtual based security
system is the use of software as well as hardware mechanism for the generation
of confined functional subgroup and secured system (Networkworld. com, 2017). The subsystem is
generated by reserving, performing, protecting, and delivering the precise
processor of the data in the subsystems. Such type of the operating system can
be altered by using Visual Basic Unity systems (Blog. malwarebytes. com, 2017).
Operation of an access control mechanism
The
virtual based security system in the Windows operating system provides
guideline integrity and secure system. Safety mechanism used in all type of
Windows operating systems and it considers bit locker and trust platform module
chip for the preservation of the data in the boot process. In the case of
Windows 7 operating systems, the significant importance for the security system
is for the unified extensible firmware interface (Securereading. com, 2018). Unable to retrieve
the highly conventional data through bios. In order to prevent unauthorized
access in the low-level operating system the combined work of unified
extensible firmware interface and Windows OS can be done. In Windows 10 OS name
the method of Windows hello improves the security system and avoid from the use
of storing passwords (Blog. malwarebytes. com, 2017). The focus of the
method is biometric authentication that supports facial impression and
fingerprints along with the pin codes different devices are developed for the
authentication of the user and to avoid from the arrival of hackers. The
Microsoft password is an innovative technique for a single sign-on a resolution
that restores asymmetric key for the software and OS and protects the software
from unwanted hacker attack (Securereading. com, 2018). The authorization
guard is developed in Windows 10, it can be implemented to prevent any type of
harsh attack. Authorization guard preserves expert and user-derived authority
for the d connection of authentication services and prevents the authenticated
data for which virtual based security. The protective element of security for
the data and application is a system guard that operates in specific computers
by using the hardware control visualization-based security system (Blog. malwarebytes. com, 2017). It can prevent
integral information and important data of Windows OS. On a regular uses the
bit locker process the data in case of hidden or stolen devices. It is an
advanced application for the security of the system that is developed by
windows OS (Blog. malwarebytes. com, 2017). The enterprise data
security provides a constant level of file encryption and rights for the
corporate files. The Windows operating system works as an agent to preserve the
whole databases on the basis of different policies. The enterprise data
security system is excellent in preserving corporate that isolating the data
and recognizing the whole system (Securereading. com, 2018).
Characteristics of the security architecture of Windows operating
system
The
framework of security can be defined as a design or defect that illustrates the
safety programs provided by the organization and how they are interconnected
with the planning system. The controlling parameter present in the security
architecture enables to have a protection level for the system and quality of
the system such as confidentiality, integrity, and availability. In the present
work, the modification of the implementation system in the security
architecture related to the os privacy architecture is discussed (Essaycorp.
com, 2019; Blog. malwarebytes. com, 2017). The windows
operating system and security architecture provided by Microsoft improves the
productivity and processing system of the data and enables the organization to transfer
the data without any breaching. The main purpose of the improved security
architecture is to prohibited security attacks. The reproduction process of
functions combines the physical records and this method can be used to
reproduce the functions (Networkworld. com, 2017). One of the
important security services developed by the Windows operating system in
security architecture is x800. The service of s800 is developed by using a
protocol layer off for the broadcasting of the whole system. The system enables
to preserve security system for the networks and devices. The adventures of x800 system increase
availability, data honesty, confidentiality of data, digital signatures,
authorization, non-repudiation, routing control, and reduces the possibility of
an external attack (Blog. malwarebytes. com, 2017).
Source:https://i2.wp.com/www.scconfigmgr.com/wp-content/uploads/2018/06/Security-OverView.jpg?resize=846%2C568&ssl=1
Reason for failure
There can be
several reason which can be they cause of the failure of the security
architectures and these all causes must be overcomes for solving the problem
and performing task smoothly. The failures of the security are now observed all
the platforms of the. With the passage of time this issue is going to become
the mores and more changeling for preventing and detecting the unexpected crashes
of the system. There are few problems observed which is considered as the root
cause for the failure of the security architectures (Kabai, 2013). These all reason are;
·
There is lack of awareness in the standards of
the security
·
The requirement of the security are not defined.
·
Lack of communication among the development team
and product
·
Errors in design for introducing the security
loop holes
·
The issues in coding and bad programming
·
Missing security test plans
Alternative solution security architecture
The plan of action is includes in
the solution for solving the problems of the security architecture as well as
by following the below given step the reason of the security architecture can
be overcomes easily (Wojciech Mazurczyk, 2013). These steps are;
·
The management of the organization must be run
the security program for their all teams with their organization.
·
The training program must be organized by the management
for maintaining the requirements and standards of the security architecture. It
is also used for the development of the team and product management
·
The use of the software tool must be promoted
for the maintenance and development process which can help for detecting the violations
of the security for measuring the score codes.
·
There are different tools which are used as the alternative
for the security architecture for example CAST
Application Intelligence Platform is one of these tools which can
used to performing the static analysis for covering the all requires of the
security.
Source: https://cloudblogs.microsoft.com/uploads/prod/sites/13/2018/08/Microsoft-365-Security-integrates-with-your-broader-IT-ecosystem-1-1024x919.png
Security limitations
The limitation of
the security architecture can be explained in the wider scenario but it is
related to the proper use of the security architecture is mostly used for Windows
operating system.
·
WOS is wider view of the field and now days it
commonly used in every organization.
·
Security architecture is providing the several functions
for reducing the external consistency.
·
Security architecture system provide the
accurate function for the use WOS on small devices.
Conclusion on Tampering the Microsoft word
It is concluded
that an overview of the security
model describes the controlling access for the objects and applications in
windows such as through files of Microsoft word. The attackers can use an
unauthorized account on the system, the mechanism used by the controlling
system of the organization is different for unauthorized users. Most
importantly, The Microsoft password is an innovative technique for a single
sign-on a resolution that restores asymmetric key for the software and OS and
protects the software from unwanted hacker attack. This paper has concluded the
research for the failure of the security architecture along with the plan of
action for solving all these issues.
References of Tampering
the Microsoft word
Blog. malwarebytes. com. (2017, 10 13). Decoy
Microsoft Word document delivers malware through a RAT. Retrieved from blog.malwarebytes.com:
https://blog.malwarebytes.com/threat-analysis/2017/10/decoy-microsoft-word-document-delivers-malware-through-rat/
Essaycorp. com. (2019). The Core
Security Mechanism for Windows. Retrieved from www.essaycorp.com:
https://www.essaycorp.com/sample/core-security-mechanism-windows.pdf
Kabai, I. (2013). 8 Reasons Enterprise
Architecture Programs Fail. informationweek.
Networkworld. com. (2017, 05 10). Email-based
attacks exploit unpatched vulnerability in Microsoft Word. Retrieved from
www.networkworld.com:
https://www.networkworld.com/article/3187796/email-based-attacks-exploit-unpatched-vulnerability-in-microsoft-word.html
Securereading. com. (2018, 10 29). New
Attack Technique uses Microsoft Word and Youtube Videos to Deliver Malware.
Retrieved from securereading.com:
https://securereading.com/new-attack-technique-uses-microsoft-word-and-youtube-videos-to-deliver-malware/
Wojciech Mazurczyk, Z. K. (2013).
Alternative security architecture for IP Telephonybased on digital
watermarking. Arxiv Org.